==========================================================================
Ubuntu Security Notice USN-2626-1
June 03, 2015
qt4-x11, qtbase-opensource-src vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 15.04
– Ubuntu 14.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS
Summary:
Qt could be made to crash or run programs as your login if it opened a
specially crafted file.
Software Description:
– qt4-x11: Qt 4 libraries
– qtbase-opensource-src: Qt 5 libraries
Details:
Wolfgang Schenk discovered that Qt incorrectly handled certain malformed
GIF images. If a user or automated system were tricked into opening a
specially crafted GIF image, a remote attacker could use this issue to
cause Qt to crash, resulting in a denial of service. This issue only
applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-0190)
Fabian Vogt discovered that Qt incorrectly handled certain malformed BMP
images. If a user or automated system were tricked into opening a specially
crafted BMP image, a remote attacker could use this issue to cause Qt to
crash, resulting in a denial of service. (CVE-2015-0295)
Richard Moore and Fabian Vogt discovered that Qt incorrectly handled
certain malformed BMP images. If a user or automated system were tricked
into opening a specially crafted BMP image, a remote attacker could use
this issue to cause Qt to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2015-1858)
Richard Moore and Fabian Vogt discovered that Qt incorrectly handled
certain malformed ICO images. If a user or automated system were tricked
into opening a specially crafted ICO image, a remote attacker could use
this issue to cause Qt to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2015-1859)
Richard Moore and Fabian Vogt discovered that Qt incorrectly handled
certain malformed GIF images. If a user or automated system were tricked
into opening a specially crafted GIF image, a remote attacker could use
this issue to cause Qt to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2015-1860)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.04:
libqt5gui5 5.4.1+dfsg-2ubuntu4.1
libqtgui4 4:4.8.6+git64-g5dc8b2b+dfsg-3~ubuntu6.1
Ubuntu 14.10:
libqt5gui5 5.3.0+dfsg-2ubuntu9.1
libqtgui4 4:4.8.6+git49-gbc62005+dfsg-1ubuntu1.1
Ubuntu 14.04 LTS:
libqt5gui5 5.2.1+dfsg-1ubuntu14.3
libqtgui4 4:4.8.5+git192-g085f851+dfsg-2ubuntu4.1
Ubuntu 12.04 LTS:
libqtgui4 4:4.8.1-0ubuntu4.9
After a standard system update you need to restart your session to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2626-1
CVE-2014-0190, CVE-2015-0295, CVE-2015-1858, CVE-2015-1859,
CVE-2015-1860
Package Information:
https://launchpad.net/ubuntu/+source/qt4-x11/4:4.8.6+git64-g5dc8b2b+dfsg-3~ubuntu6.1
https://launchpad.net/ubuntu/+source/qtbase-opensource-src/5.4.1+dfsg-2ubuntu4.1
https://launchpad.net/ubuntu/+source/qt4-x11/4:4.8.6+git49-gbc62005+dfsg-1ubuntu1.1
https://launchpad.net/ubuntu/+source/qtbase-opensource-src/5.3.0+dfsg-2ubuntu9.1
https://launchpad.net/ubuntu/+source/qt4-x11/4:4.8.5+git192-g085f851+dfsg-2ubuntu4.1
https://launchpad.net/ubuntu/+source/qtbase-opensource-src/5.2.1+dfsg-1ubuntu14.3
https://launchpad.net/ubuntu/+source/qt4-x11/4:4.8.1-0ubuntu4.9
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
iQIcBAEBCgAGBQJVbwxMAAoJEGVp2FWnRL6TAQUP/2kYE6qYoBbvfODOX0W1STQ3
JjKh63nOxVhhgSeCc1XTUyt69Wp/edo8WFYpLrnrZ031XbQnx8IbaY5hZlopXWqe
eesmBLQUUlo0mrCErc04OuUNOhTY3uB1fSmvqNaeTyBJjrZV1K9MsGTyGjGogpjD
FQL9RHbmUR41GDZ5QpBBWkeHFXzpzvKOHarUtSdXxeWRdoHFrZp+d8I75fLfehfN
InplgVKgdpAyFmA7gcOPIL+5gkuLKeNeApmObXu4fOTi4oWmbob7IguhHBeOnuAS
Meg6vhoZ479jhaW+wTipIFu1irs0lnB6r9Rs0jBzLGtjJ1TXpUDUX1NO94tsOYEb
nW15eIrJrSF5GSi875A8I6wN5U5bBBr+bdkcn9HJQuBBxiJqt//duS3FmcAtp2Vv
epB/7kxSertMjmwYVJIWZRYutCnXgAYH0hfElacye7STpyo137EwkQmfxmMAUnyH
pI+yKVd9Rw0qUXg8/OFZA7b/qEVA8rdLscQwehigq0t+xqB3R9psTgFS0ZZH81r6
cXvKREEGx+Wk5ZvpdxYoTJBbmLPrvpPCxmCLl0nQWVjV71NUxjUhB1rXw822XcKb
1U0TRAq/pMCD9GHHcx/zRVX1eWcEEI3JREZz6iZvpVCtwnGxRJnTDLteH3bpqWnH
/OWz3jGTSZb0pJWOYQsP
=CUfx
—–END PGP SIGNATURE—–
—